ilinks

ilinks

About

Wednesday 30 May 2012

Free GPRS trick For Airtel, Idea, Vodafone



Airtel                                       

I am give you Free Airtel Gprs Tricks . How To Hack Airtel Gprs Using OperaMini ? Ok Let's Follow Some Few Steps For Do This .

1. First You Need Create New Setting In Your Mobile Phone
Apn - airtelgprs.com
Proxy Address - 141.000.011.253
Port - 80
2. Now You Open Operamini Handler And Use Following Given Below Settings
Proxy Type - Http
Proxy - mocricket.comOr fb.me
That's it Now You Are Done .
This Trick Are Already tested and working fine in rajasthan . Please Let's Check in your State Also



!dea

IDEA Hack Free SMS Trick 2012 | Send Free Msg Idea To Idea By Hacking Library | IDEA Free SMS SendingTips
Now a days SMS center numbers are almost not working.
But still there is tricks to sent free sms to idea-idea and idea to other network .
Just try this trick :-
1 Make your account to 0
2 Sent an sms to any number withamount 0
3 you will get an error message as “Check operator service”.
4 Now recharge your account with rs 15 (20 rupees recharge card).
5 Now set your message center number to +91xxxxxxxxxx (xxxxxxxxxx any 10 numbers)
6 Don’t use any message center numbers there ( you may use your own phone number)
7 Now try sent a local SMS ( If not working you will not loss much money if sent a local sms)
8 If working you can continue using this trick
That's it

Vodafone 

Vodafone Hack 2011-12 For UnlimitedFree Sms By Hacking Library | Vodafone free Sms Trick 2011
9:54 Pm hacking library
Friends grab this Vodafone latest free sms center number.It works if better if you're using Spice mobile,and you have to configure the message settings to enable this trick ,by doing so, you can send unlimted sms from your vodafone mobile to your friends and relatives.
Important thing ,it works to send local sms only ,you will be chargedif you send National sms.
=>Goto message setting
=>Change your default Sms Center Number to the number given below.
+919863002222
This is tested in some state only,so if it works for you please leave it here,
Share your known tricks,and also your comments

Monday 28 May 2012

How to hack a HOTMAIL account


HOTMAIL HACKING INFO:

1.Brute force hacking:
a. Use telnet to connect to port 110 (Hotmail´s pop-server)
b. Type USER and then the victim´s username
c. Type PASS and then the guess a password
d. Repeat that until U have found the correct password.
!. This is called brute force hacking and requires patience.
It´s better than trying to guess the victims password on
hotmail homepage only because it´s faster.

2:The Best way:
a. Get the username of the victim (It usually stands in the adress-field)
b. Then type " www.hotmail.com/cgi-bin/start/victimsusername "
c. U´re in!
!. This hack only work if U are on the same network or computer as the
victim and if he don´t log out.
3. The old way: 
a. Go to http://www.hotmail/proxy.html
b. Now type the victims username. (press login)
c. Look at the source code.
d. On the fifth row U should find "action=someadress"
e. Copy that adress and paste it into the adress-field
f. You are in...
!. As you can see it´s a long procedure and the victim have
plenty of time to log out.
____
4.Another Common Way: 
a. Go to hotmail´s homepage
b. Copy the source code.
c. Make a new html file with the same code but change method=post to
method=enter
d. "view" the page
e. Change the adress to www.hotmail.com/ (don´t press enter!)
f. Make the victim type in his username and password
g. Look in the adress-field. There you´ll see ...&password:something...
!. This is the way I use, because it lets you know the password.
(If he exits the browser U can see the password in the History folder!)

READ:
Hotmail´s sysops have changed the "system" so that the victim may log
out even if U are inside his/her account. So don´t waste U´r time!

So you want to get some hotmail passwords?
This is pretty easy to do once you have got the hang of it. If you are a beginner, I wouldn't make this your first attempt at hacking. When you need to do is use a port surfer and surf over to
port 80. While there, you have to try and mail the user that you want the password from. It is best to mail them using the words "We" and "Here at Hotmail..." Most suckers fall for this and end up giving out their password. There is another way to also, you can get an anon mailer, and forge the addres as staff@hotmail.com. But you have to change the reply address to go to a different addres like user@host.com. The person that you are trying to get the pass from MUST respond to that letter for the mail to be forwarded to you. Have text like "Please reply to this letter with the subject "PASSWORD"and underneith please include your user name and password. If you have trouble Loging in withing the next few days, this is only because we are updating our mail servers but no need to worry, your mail will still be there. Even though the server may be down for an hour.

Hope you like this post waiting for your reply.

Understanding Bandwidth


BandwidthMost hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.

Network Connectivity:The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidthbetween your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic:A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth:In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.

Sunday 27 May 2012

Make invisible folder(without name and Icon)


Hey Friends ! With this simple Trick you can make your private folders invisible to others without using any kind of software.
Basically Every folder Contains two parts, an icon and a name. So to make the any folder invisible you will have to make both the icon and the name Invisible.
Step 1 –  Make the Name Invisible
• For Making the Name Invisible First Select the folder which you want to make Invisible.
• Now Press F2 key then Type ALT+0160 and Hit Enter .
• Now you will see that the name of the folder has become Invisible.
invisible name How To Make Folders Invisible Without Using Any Software
Step 2 - Make The Icon Invisible
• For Making The Icon Invisible First you have to Right click on the folder whose name you made Invisible.
• Now Go to Properties and then go to the Customize tab.
• Now click on the Change Icon button and Select any blank icon there.
invisible folder trick How To Make Folders Invisible Without Using Any Software
Note – There will be Many Blank and other Icons so for making your Folder Invisible Select any Blank Icon and Click on OK.
That's It ! Now your Folder is Invisible and only you know that where your Invisble Folder is located  on your computer .

Friday 25 May 2012

Hack any Gmail account

Previously I have posted  .In this article I am going to show you how to hack a gmail account password using phishing. Now i'm sure you know what is phishing and why it's used for, but if you don't check Wikipedia to read more about it. 
How to hack gmail account password:

1. First of all downloaGmail Phisher

2. The downloaded file contains:
  • gmail.html
  • log.txt
  • mail.php
3. Upload all of the files to any free webhost site like:
4. Once you have uploaded the files in the directory, send this phisher link (gmail.html) to your victim and make him login to his Gmail account using your sent Phisher.

5. Once he logs in to his Gmail account using Phisher, all his typed Gmail id and password is stored in "log.txt".


6. Now, open log.txt to get hacked Gmail id and password as shown.


That's it, very simple. Now you have your victim's Gmail id and password hacked.


How it works ?


When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it . So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets his gmail.com password hacked.


Do you have questions, comments, or suggestions? Feel free to post a comment!

Thursday 24 May 2012

Install Multiple Operating systems In a single hard disk


                    

This tutorial explains installing more than one operating system (OS) on a PC (i.e., dual booting, triple booting).


Introduction/Overview:
At times, you just want to run a certain program in Windows 98 or Windows 2000. Most users have a separate PC with one operating system installed. However, this tutorial will explain how to set up multiple operating systems on one PC.
Requirements:
-Basic knowledge of installing an OS. (If you need more information on this topic, please see specific Tech-Recipes tutorials that explain the process in detail.)
-Setup disks for each OS or a custom bootable DVD (with all operating systems on it)
-Bootable Windows 98 floppy disk
-60 GB of free, unpartitioned space (best size for partitions:
15 GB for Windows 98, 20 GB for Windows 2000, 20 GB for Windows XP Professional)
-Multiple partitions (We will need to be sure to install Windows 98 to the C: drive.) or multiple hard drives (not covered, but briefly explained)
For this tech-recipe, I am recommending you do a COMPLETE backup of all your personal files; and starting from scratch, conduct a clean install to avoid frustration.
Also, if you are using this tutorial as a guide, be sure to print it out.
Step 1. Preparing Hard Drives for Multiple OS’s
The first thing we will do is delete your partitions.
a. To do this, we will need to change the BIOS/CMOS settings so your PC will boot to floppy first.
b. Insert the Windows 98 boot disk, and reboot your PC.
c. It will bring up a Windows 98 Startup Menu screen. Choose the first option: Start Computer with CD-ROM Support. The boot disk will load and eventually return to a DOS prompt ( A:\).
d. At the A:\ type FDISK and press Enter.
e. This will now load the FDISK utility. The first screen might ask you “Do you wish to enable large disk support?” Choose Y for yes. Also, if your C: was formatted as a NTFS drive vs FAT32, it might also ask you if you want to treat non-FAT drives as unknown or something else. Again, choose Y for yes.
Now, you should be at the FDISK menu.
f. The first thing we will do is [4] Display Partition Information to see what we have set up and what we need to delete.
g. Once we see what we have set up, Esc back to the Main FDISK menu. Then go to [3] Delete partition or Logical DOS Drive.
Now, it will bring up the following four options:
1. Delete Primary DOS Partition
2. Delete Extended DOS Partition
3. Delete Logical DOS Drive(s) in the Extended DOS Partition
4. Delete Non-DOS Partition
When you delete partitions, here are some basic guidelines.
The order to delete partitions is as follows (first to last):
-Non-DOS > Logical DOS Drive(s) > Extended DOS Partition(s) > Primary DOS Partition
-If you have any NTFS drives, if possible, try to delete them in Windows before booting to floppy. It makes life easier, especially if the partition is created in an Extended DOS Partition. When trying to delete them from FDISK, you might receive the notice, “Cannot Delete Extended DOS partition while logcal drives exist.” However, when you try to delete the logical drive, your PC indicates that none exist. (I will explain how to avoid running into this problem in the creating partitions section.) If this is the case, go ahead and quick start install XP. Once the XP setup gets to the disk part, delete the NTFS partition from there, and then start your whole installation from scratch again (Delete all partitions and create new ones.).
Once you have deleted all of the partitions, go back to the main FDISK menu. Proceed to the next step.
Step 2. Creating Partitions with FDISK (A 60GB or greater hard drive is recommended for this.) As an example, I will use a 60 GB hard drive.
a. First, let us decide how many operating systems we want to be able to use on this PC (of course, only one at a time). In this tech-recipe, I will use these 3 operating systems as an example because these usually are the three Windows operating systems most people use and need:
Windows 98 SE
Windows 2000 Prof.
Windows XP Prof
I have always used and recommended creating individual partitions for each operating system you plan to run. This way, there are no issues with pagefiles, directories, etc.
b. e should still be on the FDISK menu (below).
________________________
Choose one of the following:
1. Create DOS partition or Logical DOS Drive
2. Set active partition
3. Delete partition or Logical DOS Drive
4. Display partition information
Enter choice: [1]
Press Esc to exit FDISK
_____________________
c. Go to [1] Create DOS partition or Logical DOS Drive and pressEnter.
d. Then go to [1] Create Primary DOS Partition and Enter.
If you have a Primary DOS partition, it will give you a message which reads “Primary DOS Partition already exists.” You will need to delete this. (put in italics, smaller)
e. It will now state that it is verifying drive integrity. Once it is done with this, it will ask the following:
“Do You wish to use maximum available size for a primary DOS partition and make the partition active (Y/N)?”
Choose N . (pic below):
________
Create Primary DOS partition
Current fixed disk drive : 1
Verifying drive integrity, 100% complete.
Current fixed disk drive: 1
Do you wish to use the maximum available size for a primary DOS partition
and make the partition active (Y/N) ………………..? [N]
________
f. It will now ask what size partition you wish to create, in either bytes or in percent (xx%). Also, you might notice that the space free/available might not match up with the size of your hard drive (if it is bigger than 20gb). This is because FDISK is limited to seeing up to 20GB. I typically create partitions based on percentage. In my example, I have 60 GB hard drive, so I am going to create this partition to be about 15GB (This will be my Windows 98 SE partition. I do not run many programs with Win98, so I probably only need about 10 GB.). So I would find out what percent of 60 GB is 15 GB.
After the math, 25% will equal approximately 15 GB.
Enter the percentage as follows: xx% . (Be sure to put in the % sign, or it will take the value as size in bytes.) Then hit Enter and it will create your partitions.
g. Once it finishes, it will bring you to this screen. Just ESC to the FDISK menu. At the bottom of the FDISK Menu, you should see the following message:
WARNING! No partitions are set active – disk 1 is not startable unless a partition is set active.
h. Go to [2] Set active partition, and enter the number of the partition set as active and press Enter. It will let you know that Partition 1 is now active.
i. Now, ESC go all the way back to to the DOS Prompt (a:\) and reboot your computer. Be sure to leave the boot disk in since we will need to format the drive we just created.
Step 3. Formatting the Drive / Pre-installation
a. Again, choose Start Computer with CD-Rom Support and let the boot disk load to the a:\ DOS prompt.
b. Now type: format c: and follow the prompts.
c. This might take a few minutes to complete. Let it finish.
d. After you have the c: drive formatted, we can start the installation of the first operating system.
Step 4. Installing the First Operating System
a. We should still be the a:\ after the format has completed.
b. We will need to go to the CD-ROM by typing e: and pressing Enter.
c. The prompt should change to e:\.
d. Now, we need to go into the windows 98 directory, and type cd win98 and press Enter.
e. The prompt will now change to e:\win98.
f. (Optional, but recommended) Enable smartdrv to speed up the installation. Do this by typing the following: smartdrv
Type smartdrv again to see if disk cache is enabled for the c: drive.
g. Now, at the E:\win98\ prompt, type: setup /ie
h. Go through the Windows 98 setup.
i. Once you are finished with the setup, Windows has to reboot. Reboot your PC, and be SURE YOUR FLOPPY IS not in the drive.
j. Go through the rest of Setup. You should now have Windows 98 SE installed on your C: drive.
Step 5. Installing Additional Operating Systems
INFO:
-When you setup your PC as we are now, the installation order of the operating systems is VERY important.
Microsoft recommends this order for installing OS, for multiple booting (first to last):
Windows 98 SE > Windows ME > Windows 2000 > Windows XP > Non windows OS (e.g., Linux, Unix, etc.)
Windows 98 SE is installed and running on our pc. The setting up of the remaining two operating systems will be simple since we can do the partition creation and formatting within the Windows 2000 / XP installation.
a. Insert your Windows 2000 Setup CD.
b. Go through the Setup Wizard
a. BE SURE TO CHOOSE installation type: Advanced (CLEAN/NEW, not upgrade!)
b. After Windows 2000 Setup copies the files to your PC, it will reboot into the installation program
c. When it gets to the choose partition to install, you will want to create a new partition and format it as FAT32 (You can convert it later on. This just makes things easier). Once it finishes creating and formatting the new drive (d:), choose that as the drive in which to install Windows 2000.
I recommend a 20 GB sized partition.
d. Go through the rest of the setup as normal
e. Once you reboot, it will come up with a “Choose Operating System” screen. Choose the Windows 2000 option.
f. Once you do, it will load Windows 2000 from the d:. Now, we will install Windows XP
g. Put in the Windows XP setup CD and again choose Advanced as installation type (not upgrade, since we want to install XP on a new partition).
h. Again, once it finishes copying files, Windows will reboot. If the boot loader shows up, let it load by itself. It should load up the Windows XP Installation Program.
i. Once you get to the drive location, we will create a new partition and format it as FAT32 file system. You can make the size of this drive to be whatever is remaining. (Be sure that you do the math prior to this so that this partition is at least 15 GB or more, depending on whether or not you have another hard drive in your PC that you have your music, personal files on. This is HIGHLY RECOMMENDED.).
j. Again, finish the install, and XP will be added to the Choose Operating System. Once you finish the setup of XP, you are good to go.
HELPFUL TIPS/NOTES:
-When you install programs for Windows 98, 2000 or XP, that program is ONLY installed for that OS, not for ALL of them.
-You can edit the order, labels, and timeout in secs of the booting of Windows.
In your Windows XP, right click My Computer > Properties > Advanced > Startup/Recovery. The top options are related to how Windows boots. If you click the Edit Boot.ini, it will open up the file in which you can remove items, edit, change, and add. Be sure you know what your changing before you do!
-DO NOT CHANGE YOUR PAGEFILE location! I did this once. It put my XP pagefile on the same drive as my Windows 2000 pagefile. Let us just say bad things happened.
-If you format your 2000 and XP partitions to NTFS, Windows 98 will not be able to see them (unless you have a program that allows for Windows 98 to be able to access NTFS drives).

Saturday 19 May 2012

Promote your FaceBook Page, twitter, Google+, you tube accounts and a lot more,..

   
I am again here with a very useful post. Everyone who have Facebook page, twitter account, YouTube account,  Google+ account, Website, Blog or any other popular social networking page for express there thoughts, or about a business they can promote all these easily with the help of some community sites.
 You can also get Traffic for your website or blog.
  On internet there are many sites available for this purpose, so I am here with a list of some of these sites. 


1. Add Me Fast
2. You Like Hits
3. Get Like Hits
4. Keeko
5. Trafficstroms
6. Let Us Follow


In all these sites you need to follow some easy steps to get likes, so here are  the steps.

1. Click the sites above
2. Register there
3. If needed confirm your Email account
4. login
5. add your Page, link, site, or account
6. Specify no of points(coins) for each click.
6. earn points(coins) and if needed add the points to your link.

That's it,.....      Now Be ready To get fastest likes for your page

Note:- More points you added for each click, will give you the fastest publicity, fans etc.

(So If you like this post then help us by subscribing us or Like our Facebook Page)

Win Full version of any antivirus(avast, Norton, Quick Heal) obviously free,

Hello guys,

    Today I am going to give you opportunity to win a full version of any of these( Norton , Avast, Quick Heal, AVG) antivirus. 
 To get these you just have to follow some steps, as given bellow,
1. Like Our FaceBook Page.

2. Follow us By clicking here  If you have any trouble in following ,
   Subscribe us By Email (at the Top right corner of the page) by Email.


3. Leave a Comment with your Name and Mail_ID bellow.


          That's it,......................

Rules:
1. You must follow the above three steps.
 
2. All the winners will be selected Randomly.


3. All Winners will be decided by the admin.


4.  The lats date for participate in the contest is May-18-2012 


5. winners will announced on May-29-2012 


                                                                Best of luck to all,...
If you are using any other antivirus comment bellow and I will provide you A full free version of  that Antivirus

As i said

here are the key files for Avast:

Download 1st


Download 2nd

And you here is the activator for Norton Internet security

Download

Enjoy.....

Friday 18 May 2012

How to Fix “Task Manager has been Disabled by Your Administrator”?


That's a very common problem for Windows users. Many times when you try to open Task Manager, you find that "Task Manager" option has been grayed out:

Also when you try to run it by typing "taskmgr" in RUN dialog box, Windows shows following error message:
Task Manager has been disabled by your administrator.

There might be 2 possible reasons behind this problem:
  • Your system administrator applied the restriction using Registry Editor or Group Policy Editor.
  • Your system has been infected with virus and it has disabled the Task Manager.
If you are already the Administrator of the system, then your system is most probably infected. You should follow the instructions given in following topic first:
Is Your System Infected with a Virus / Spyware / Adware / Trojan?
Now if your system in not infected or you have successfully removed the virus, then you can follow these simple steps to enable Task Manager again:
1. Press Window Key+D Type regedit in Run dialog box or Startmenu Search box and press Enter. It'll open Registry Editor. If Registry editor is also disabled
2. Now go to following keys one by one:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System

HKEY_USERS\.default\Software\Microsoft\Windows\CurrentVersion\Policies\System
and look for a DWORD value "DisableTaskMgr" in right-side pane. If you find it, delete it.

3. That's it. Now Task Manager will be enabled.
PS: If you are not familiar with editing the registry, then you can use ready-made registry script to do the task automatically. Download following ZIP file, extract it and then run the extracted .REG file. It'll ask for confirmation, accept it:
Enable Task Manager


Having any trouble? feel free to comment,..

Some very usefull commonds for youtube


Did you know that you can use advanced commands to perform more dynamic searches on Youtube?, Yes today you’ll Learn how to narrow or expand your searches and search for multiple items simultaneously. Today we will See how you can get Accurate Video search results on YouTube using simple Commands in plain English. Now a days Webmasters are also optimizing their videos using simple SEO techniques and that’s the reason you might end up getting Wrong search results, just like Google.
Youtube Search Commands
 So here’s are the 8 lesser known YouTube search commands:

#1. channel – This Searches only YouTube channels

#2. this week | today | this month - Searches videos uploaded in the given time frame.

#3. partner – Searches for video uploaded by YouTube partners only.

#4. movie – Searches for full length movies available on YouTube.

#5. hd - Limits only HD quality videos.

#6. 3d – Limits only 3D videos.

#7. playlist – returns only videos in playlists.

#8. long – Returns videos that are 20 minutes or longer
To use the Above simple search commands all you have to do is type in your search followed by a comma and the command. Example:
Eminem, this month
Microsoft, 3d

#9. You can also mix or combine the above commands with commas and apply them all to your search query.
Example: Eminem, this monthhd
The above Query will return all the HD videos of Eminem that have been uploaded to YouTube this month.



Wednesday 16 May 2012

Hack any WiFi network Easily


                                 
Doesn’t it suck when you see your laptop’s catching so many wi-fi signals but none of them is accessible.. don’t you feel like “I wish I could some how break the password and dive into the deep oceans of the information” I beleive everyone should be able to have free internet. If someday I make it big enough and I’ll be having ample money.. I promise I’ll provide free wifi hotspots all over the places.. “Let there be INTERNET”.. even If I don’t get rich.. I’ll become a politician and would make Internet a Fundemental right to every citizen.. Now that would be something..
That’s enough with the Castles in the air.. now lets get back to reality..
What I can do for you right now is that I can tell you how to hack a wifi network to access Internet.. Some would call it stealing.. some like me won’t..
I’ll call it Sharing.. Sharing is what on which the whole Internet is build upon…
So.. Here’s how we do it..
1) First we need to scan for available wireless networks.
Theres this great tool for windows to do this.. called “NetStumbler” or Kismet for Windows and Linux andKisMac for Mac
Below is a screenshot of NetStumbler.. It will show you a list of all the wireless access points in your range.
It’ll also show how the Wi-fi network is secured..
The two most common encryption types are:
1) WEP
2) WAP
WEP i.e Wire Equivalent Privacy is not consideres as safe as WAP i.e Wireless Application Protocol.
WEP have many flaws that allows a hacker to crack a WEP key easily.. whereas
WAP is currently the most secure and best option to secure a wi-fi network..
It can’t be easily cracked as WEP because the only way to retreive a WAP key is to use a brute-force attack or dictionary atack.
Here I’ll tell you how to Crack WEP
To crack WEP we will be using Live Linux distribution called BackTrack to crack WEP.
BackTrack have lots of preinstalled softwares for this very purpose..
The tools we will be using on Backtrack are:
Kismet – a wireless network detector
airodump – captures packets from a wireless router
aireplay – forges ARP requests
aircrack – decrypts the WEP keys
1) First of all we have to find a wireless access point along with its bssid, essid and channel number. To do this we will run kismet by opening up the terminal and typing in kismet. It may ask you for the appropriate adapter which in my case is ath0. You can see your device’s name by typing in the command iwconfig.
How to Hack a Wifi network | WEP Hacking | Wifi Hacking
2) To be able to do some of the later things, your wireless adapter must be put into monitor mode. Kismetautomatically does this and as long as you keep it open, your wireless adapter will stay in monitor mode.
3) In kismet you will see the flags Y/N/0. Each one stands for a different type of encryption. In our case we will be looking for access points with the WEP encryption. Y=WEP N=OPEN 0=OTHER(usually WAP).
4) Once you find an access point, open a text document and paste in the networks broadcast name (essid), its mac address (bssid) and its channel number. To get the above information, use the arrow keys to select an access point and hit <ENTER> to get more information about it.
How to Hack a Wifi network | WEP Hacking | Wifi Hacking
5) The next step is to start collecting data from the access point with airodump. Open up a new terminal and start airodump by typing in the command:
airodump-ng -c [channel#] -w [filename] –bssid [bssid] [device]
In the above command airodump-ng starts the program, the channel of your access point goes after -c , the file you wish to output the data goes after -w , and the MAC address of the access point goes after –bssid. The command ends with the device name. Make sure to leave out the brackets.
6) Leave the above running and open another terminal. Next we will generate some fake packets to the target access point so that the speed of the data output will increase. Put in the following command:
aireplay-ng -1 0 -a [bssid] -h 00:11:22:33:44:55:66 -e [essid] [device]
In the above command we are using the airplay-ng program. The -1 tells the program the specific attack we wish to use which in this case is fake authentication with the access point. The 0 cites the delay between attacks, -a is the MAC address of the target access point, -h is your wireless adapters MAC address, -e is the name (essid) of the target access point, and the command ends with the your wireless adapters device name.
7) Now, we will force the target access point to send out a huge amount of packets that we will be able to take advantage of by using them to attempt to crack the WEP key. Once the following command is executed, check yourairodump-ng terminal and you should see the ARP packet count to start to increase. The command is:
aireplay-ng -3 -b [bssid] -h 00:11:22:33:44:5:66 [device]
In this command, the -3 tells the program the specific type of attack which in this case is packet injection, -b is theMAC address of the target access point-h is your wireless adapters MAC address, and the wireless adapter device name goes at the end.
8) Once you have collected around 50k-500k packets, you may begin the attempt to break the WEP key. The command to begin the cracking process is:
aircrack-ng -a 1 -b [bssid] -n 128 [filename].ivs
In this command the -a 1 forces the program into the WEP attack mode, the -b is the targets MAC address, and the -n 128 tells the program the WEP key length. If you don’t know the -n , then leave it out. This should crack the WEP key within seconds. The more packets you capture, the bigger chance you have of cracking the WEP key.
How to Hack a Wifi network | WEP Hacking | Wifi Hacking
I am sure it might have helped.:)
So keep reading and do subscribe to Learn Hacking
Feel Free to Post comments.